基于插值多项式方法的物理层认证机制

Yong-Bing Zhang, Liang Jin, Qiang Han
{"title":"基于插值多项式方法的物理层认证机制","authors":"Yong-Bing Zhang, Liang Jin, Qiang Han","doi":"10.1109/IEEECONF52377.2022.10013332","DOIUrl":null,"url":null,"abstract":"Most of the existing physical layer challenge-response authentication methods assume that the attacker does not have access to the channel information of both legitimate parties. Their security relies on the privacy of the wireless channel strongly. However, in the actual communication environment, the above assumption is difficult to guarantee that if the attacking party obtains the legitimate channel information, it can directly crack the key based on the authentication response. To address these problems, this paper proposes a physical layer authentication mechanism based on the interpolated polynomial method using polynomial interpolation. First, the authentication parties extract the wireless channel characteristics and combine them with the shared key to obtain the joint key. Then both parties use the same key pair to construct their respective curve equations by Newton interpolation polynomial. Subsequently, the sender randomly selects the data not in the joint key to substitute into the equation to construct the authentication vector and send it to the authenticating party. Finally, the authenticating party sets the authentication threshold according to the requirements and calculates the matching result based on the data in the authentication vector for judgment. The simulation results show that the method has great security and authentication success rate.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":" 3","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Physical Layer Authentication Mechanism Based on Interpolated Polynomial Method\",\"authors\":\"Yong-Bing Zhang, Liang Jin, Qiang Han\",\"doi\":\"10.1109/IEEECONF52377.2022.10013332\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Most of the existing physical layer challenge-response authentication methods assume that the attacker does not have access to the channel information of both legitimate parties. Their security relies on the privacy of the wireless channel strongly. However, in the actual communication environment, the above assumption is difficult to guarantee that if the attacking party obtains the legitimate channel information, it can directly crack the key based on the authentication response. To address these problems, this paper proposes a physical layer authentication mechanism based on the interpolated polynomial method using polynomial interpolation. First, the authentication parties extract the wireless channel characteristics and combine them with the shared key to obtain the joint key. Then both parties use the same key pair to construct their respective curve equations by Newton interpolation polynomial. Subsequently, the sender randomly selects the data not in the joint key to substitute into the equation to construct the authentication vector and send it to the authenticating party. Finally, the authenticating party sets the authentication threshold according to the requirements and calculates the matching result based on the data in the authentication vector for judgment. The simulation results show that the method has great security and authentication success rate.\",\"PeriodicalId\":193681,\"journal\":{\"name\":\"2021 International Conference on Advanced Computing and Endogenous Security\",\"volume\":\" 3\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-04-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Advanced Computing and Endogenous Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IEEECONF52377.2022.10013332\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Advanced Computing and Endogenous Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IEEECONF52377.2022.10013332","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

大多数现有的物理层挑战-响应身份验证方法都假定攻击者无法访问合法双方的通道信息。它们的安全性很大程度上依赖于无线信道的私密性。但在实际通信环境中,上述假设很难保证攻击方在获得合法通道信息的情况下,可以根据认证响应直接破解密钥。针对这些问题,本文提出了一种基于插值多项式方法的物理层认证机制。首先,认证双方提取无线信道特征,并将其与共享密钥组合得到联合密钥。然后双方使用相同的密钥对,用牛顿插值多项式构造各自的曲线方程。随后,发送方随机选择不在联合密钥中的数据代入方程,构造认证向量,发送给认证方。最后,认证方根据需求设置认证阈值,并根据认证向量中的数据计算匹配结果进行判断。仿真结果表明,该方法具有很高的安全性和认证成功率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Physical Layer Authentication Mechanism Based on Interpolated Polynomial Method
Most of the existing physical layer challenge-response authentication methods assume that the attacker does not have access to the channel information of both legitimate parties. Their security relies on the privacy of the wireless channel strongly. However, in the actual communication environment, the above assumption is difficult to guarantee that if the attacking party obtains the legitimate channel information, it can directly crack the key based on the authentication response. To address these problems, this paper proposes a physical layer authentication mechanism based on the interpolated polynomial method using polynomial interpolation. First, the authentication parties extract the wireless channel characteristics and combine them with the shared key to obtain the joint key. Then both parties use the same key pair to construct their respective curve equations by Newton interpolation polynomial. Subsequently, the sender randomly selects the data not in the joint key to substitute into the equation to construct the authentication vector and send it to the authenticating party. Finally, the authenticating party sets the authentication threshold according to the requirements and calculates the matching result based on the data in the authentication vector for judgment. The simulation results show that the method has great security and authentication success rate.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
3D Deployment of Dynamic UAV Base Station based on Mobile Users Physical Layer Authentication Mechanism Based on Interpolated Polynomial Method Application of Artificial Intelligence Technology in Honeypot Technology Ensemble Learning Methods of Adversarial Attacks and Defenses in Computer Vision: Recent Progress A Lightweight Authentication and Key Agreement Protocol for IoT Based on ECC
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1